Why Is Your Network Security Failing You?

Written by: Francesco Trama | Published on: November 23rd, 2015

About The Author

Francesco Trama
Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

Network Security How secure is your organization’s network? Take a minute to think about it. You have firewalls in place. You have regular network security inspections that analyze the strength of your network security and show you where it’s vulnerable, so that you can fix it. The results show you that you’re protected! What do you have to worry about? Unfortunately, important as network security inspections are, they also create a false sense of security.

Your Network Vulnerabilities

When it comes down to it, network security inspections are based on past history and good guessing. They scan for known threats, threats that have been detected before. Detection of new threats is based on how similar they are to those old threats. So an ordinary attacker uses the same, known attacks that their predecessors used, and gets caught. But a smart attacker will change things up. They’ll stay away from that path and find a new way in, that your security doesn’t recognize yet.

Many infiltrations carry payloads that can be downloaded or purchased online. The attacker changes the payload slightly to suit their needs and sends them off to the target. Threat detection systems are perfect for these scenarios, and vital to your system’s security. However, while today’s adaptive threat systems are far superior to the technology we had years ago, they are not perfect. They can still be breached. No matter what these systems write in their ads, they are only a vessel with many tools. With new threats and new payloads, any automatic threat scanner can still be beaten by the human element.

Geo-IP Filtering Can Help

So what can you do to keep your network safe? There are a few precautions you can take to make your network security safer and more reliable. The precaution to take is the “Defense in Depth Approach,” meaning that multiple layers of security controls should be placed throughout a security environment. As compared to the Castle Approach where one layer of security is simply not enough. That’s why we need Geo-IP filtering.

Geo-IP filtering is poised to become standard in the security market. It provides an extra bit of protection, on top of your regular security, that can help keep you safer.

One of the problems with maintaining network security is simply the volume of threats that you need to deal with. A large sized company can face thousands of attempted network attacks every day. And if 999 are stopped, but 1 gets in, then your network is still compromised.

A Geo-IP layer filters out the bulk of attempted attacks automatically, based on their location of origin, company and/or port destination. Before they can even reach your regular network security to have their potential threat levels analyzed, your Geo-IP boots them out the door, because they come from a country or company that’s a known source of network attacks. Or, the entity is attempting to access a service or port that you’ve determined is not necessary for that entity to access. As a result, the number of actual threats that reach your network security is much more manageable. Your security team is not so overworked, and can examine these potential threats individually, fighting the human factor of the attackers with a human factor of their own.

Does adding a Geo-IP layer to your security system make it foolproof or impenetrable? No. There’s no such thing as a completely impenetrable security system. And the false sense of security that comes from thinking you have one can end up being your system’s biggest weakness. However, Geo-IP filtering is still a great asset and it should be considered the first line in the “Defense in Depth Approach.” It reduces the number of threats you have to worry about and gives your security team the extra time and resources to be proactive in responding to threats, rather than reactive. It still may not be perfect, but an extra Geo-IP layer is your best bet for keeping out threats and keeping your network safe and secure.

{{cta(‘caaa6241-6957-42f5-86fb-fa5207ab5ecb’)}}